<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Payload-Delivery — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/payload-delivery/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 15:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/payload-delivery/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious CSC.exe Parent Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-csc-suspicious-parent/</link><pubDate>Tue, 02 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-csc-suspicious-parent/</guid><description>The Csc.exe (C# compiler) process is being launched by unusual parent processes or from suspicious locations, indicating potential malware execution or defense evasion.</description><content:encoded><![CDATA[<p>Attackers are leveraging the legitimate Csc.exe (C# compiler) to execute malicious code, often as a part of defense evasion or payload delivery. This is achieved by spawning Csc.exe from unusual parent processes such as scripting hosts (cscript.exe, wscript.exe), Office applications (excel.exe, winword.exe), or PowerShell, especially when combined with encoded commands. Observed techniques also include launching Csc.exe from temporary or unusual directories. This activity bypasses traditional application whitelisting and can lead to the execution of arbitrary code. This activity has been associated with WarzoneRAT, DarkVNC, and the delivery of IMAPLoader malware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access, potentially through phishing or exploiting a vulnerability.</li>
<li>A script or Office macro executes, initiating a command-line process.</li>
<li>This process then invokes a scripting host (e.g., cscript.exe) or PowerShell.</li>
<li>The scripting host or PowerShell executes a command that downloads or creates a C# source code file.</li>
<li>Csc.exe is then invoked, often from a temporary directory, to compile the downloaded/created C# code.</li>
<li>The compiled C# code executes, performing malicious actions.</li>
<li>The malicious code may establish persistence, communicate with a C2 server, or perform data exfiltration.</li>
<li>The final objective might be to deploy ransomware, steal sensitive data, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to compromise systems, steal data, or deploy malware. Depending on the user&rsquo;s permissions, the attacker could gain elevated privileges. The observed techniques have been associated with ransomware deployment, data theft, and remote access trojans (RATs).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Csc.EXE Execution Form Potentially Suspicious Parent&rdquo; to detect suspicious parent processes of csc.exe.</li>
<li>Monitor process creation events for csc.exe with parent processes like scripting hosts or Office applications.</li>
<li>Investigate any instances of csc.exe being executed from temporary directories or user profile locations by reviewing process_creation logs.</li>
<li>Enable Sysmon process creation logging to capture detailed process information, including parent-child relationships, for effective detection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.execution</category><category>attack.defense-evasion</category><category>csc.exe</category><category>payload-delivery</category></item></channel></rss>